Tweetovi

Blokirali ste korisnika/cu @7aSecurity

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @7aSecurity

  1. Prikvačeni tweet
    24. sij
    Poništi
  2. proslijedio/la je Tweet
    prije 17 sati

    DOMPurify 2.0.8 has been released: Please update asap in case you use jQuery 3.x and SAFE_FOR_JQUERY.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet

    Fegu - first open source jailbreak based on the checkm8 exploit by

    Poništi
  4. proslijedio/la je Tweet
    2. velj
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Neat xss payload required to bypass filters: 1. No periods allowed 2. Regex filter on text followed by '(' Blocking "alert(, confirm(, etc", but the self['alert']( got by the filter Payload: ?t=test'*self['alert'](document['domain'])*'test

    Poništi
  6. proslijedio/la je Tweet
    30. sij

    Some hunters made over €50.000 in bug bounties with this simple trick. 🤑 Thanks for the , !

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    31. sij

    We are now sold out for our Global Missing CTF with an all time high of 400 registrants! Participants will be working on global missing persons cases this weekend including ones provided by and the AFP's National Missing Persons Coordination Centre!

    Poništi
  8. proslijedio/la je Tweet
    30. sij

    A new sideloading tool for Windows. It's faster than AltStore, chances of Revokes are very low. You can sign and install apps directly from the tool, Install as many apps as you want. Coming soon for iOS 11 and above once the GUI is ready.

    Poništi
  9. 30. sij

    Coming to USA in 2020.08? Interested in .js or Security? Come and have shells, injections and fun, all action, no fluff!

    Poništi
  10. proslijedio/la je Tweet
    28. sij
    Poništi
  11. proslijedio/la je Tweet
    27. sij

    For those who have their Eventbrite tickets for Saturday's Global Missing CTF, we have opened up team registration within the CTF platform! Use your Eventbrite Order Number on to start forming your teams!

    Poništi
  12. proslijedio/la je Tweet
    26. sij

    As I have no cool new findings, lets start the year with an old IE bug - bypassing Content-Disposition: attachment with mhtml:

    Poništi
  13. proslijedio/la je Tweet
    24. sij

    HTTP Request Smuggler now supports overriding the request method! spotted that using an alternative method like DELETE can sometimes let you exploit otherwise-secure targets. (If you accidentally delete someone's homepage, that's on your head!)

    Poništi
  14. proslijedio/la je Tweet
    23. sij

    Video of webcast on the training module for Pass-The-Ticket is out

    Poništi
  15. 21. sij
    Poništi
  16. proslijedio/la je Tweet
    17. sij
    Poništi
  17. proslijedio/la je Tweet
    15. sij

    We're really quite excited for HTTP/2 support in

    Poništi
  18. proslijedio/la je Tweet
    16. sij

    Anyone else drink 🍷 or have a 🍹 while watching an online seminars? 👀 great job last night for the Atlanta meetup "Sexy Mobile App Attacks By Example"

    Poništi
  19. proslijedio/la je Tweet
    12. sij

    Just posted Remote Code Execution in Three Acts: Chaining Exposed Actuators and H2 Database Aliases in Spring Boot 2. Using a payload containing three different programming languages :)

    Poništi
  20. proslijedio/la je Tweet
    13. sij

    Upcoming Shitrix (CVE-2019-19781) exploit in Vuln found by Module by

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·